/net-tools-latest/mbedtls-2.4.0/programs/aes/ |
D | aescrypt2.c | 84 unsigned char digest[32]; in main() local 128 memset(digest, 0, sizeof(digest)); in main() 238 mbedtls_md_finish( &sha_ctx, digest ); in main() 240 memcpy( IV, digest, 16 ); in main() 264 memset( digest, 0, 32 ); in main() 265 memcpy( digest, IV, 16 ); in main() 270 mbedtls_md_update( &sha_ctx, digest, 32 ); in main() 272 mbedtls_md_finish( &sha_ctx, digest ); in main() 276 mbedtls_aes_setkey_enc( &aes_ctx, digest, 256 ); in main() 277 mbedtls_md_hmac_starts( &sha_ctx, digest, 32 ); in main() [all …]
|
D | crypt_and_hash.c | 84 unsigned char digest[MBEDTLS_MD_MAX_SIZE]; in main() local 277 mbedtls_md_finish( &md_ctx, digest ); in main() 279 memcpy( IV, digest, 16 ); in main() 294 memset( digest, 0, 32 ); in main() 295 memcpy( digest, IV, 16 ); in main() 300 mbedtls_md_update( &md_ctx, digest, 32 ); in main() 302 mbedtls_md_finish( &md_ctx, digest ); in main() 308 if( mbedtls_cipher_setkey( &cipher_ctx, digest, cipher_info->key_bitlen, in main() 325 mbedtls_md_hmac_starts( &md_ctx, digest, 32 ); in main() 372 mbedtls_md_hmac_finish( &md_ctx, digest ); in main() [all …]
|
/net-tools-latest/mbedtls-2.4.0/programs/hash/ |
D | hello.c | 49 unsigned char digest[16]; in main() local 54 mbedtls_md5( (unsigned char *) str, 13, digest ); in main() 57 mbedtls_printf( "%02x", digest[i] ); in main()
|
/net-tools-latest/tinydtls-0.8.2/sha2/ |
D | sha2.c | 602 void SHA256_Final(sha2_byte digest[], SHA256_CTX* context) { in SHA256_Final() argument 603 sha2_word32 *d = (sha2_word32*)digest; in SHA256_Final() 610 if (digest != (sha2_byte*)0) { in SHA256_Final() 666 sha2_byte digest[SHA256_DIGEST_LENGTH], *d = digest; in SHA256_End() local 673 SHA256_Final(digest, context); in SHA256_End() 684 MEMSET_BZERO(digest, SHA256_DIGEST_LENGTH); in SHA256_End() 688 char* SHA256_Data(const sha2_byte* data, size_t len, char digest[SHA256_DIGEST_STRING_LENGTH]) { in SHA256_Data() 693 return SHA256_End(&context, digest); in SHA256_Data() 966 void SHA512_Final(sha2_byte digest[], SHA512_CTX* context) { in SHA512_Final() argument 967 sha2_word64 *d = (sha2_word64*)digest; in SHA512_Final() [all …]
|
/net-tools-latest/mbedtls-2.4.0/tests/suites/ |
D | test_suite_mdx.data | 11 md2_text:"message digest":"ab4f496bfb2a530b219ff33031fe06b0" 32 md4_text:"message digest":"d9130a8164549fe818874806e1c7014b" 53 md5_text:"message digest":"f96b697d7cb7938d525a2f31aaf161d0" 74 ripemd160_text:"message digest":"5d0689ef49d2fae572b881b123a85ffa21595f36"
|
D | test_suite_pkcs1_v15.function | 114 int radix_E, char *input_E, int digest, int hash, 158 if( mbedtls_md_info_from_type( digest ) != NULL ) 159 …TEST_ASSERT( mbedtls_md( mbedtls_md_info_from_type( digest ), message_str, msg_len, hash_result ) … 161 …TEST_ASSERT( mbedtls_rsa_pkcs1_sign( &ctx, &rnd_buffer_rand, &info, MBEDTLS_RSA_PRIVATE, digest, 0… 177 char *input_E, int digest, int hash, 202 if( mbedtls_md_info_from_type( digest ) != NULL ) 203 …TEST_ASSERT( mbedtls_md( mbedtls_md_info_from_type( digest ), message_str, msg_len, hash_result ) … 205 …TEST_ASSERT( mbedtls_rsa_pkcs1_verify( &ctx, NULL, NULL, MBEDTLS_RSA_PUBLIC, digest, 0, hash_resul…
|
D | test_suite_pkcs1_v21.function | 114 int radix_E, char *input_E, int digest, int hash, 158 if( mbedtls_md_info_from_type( digest ) != NULL ) 159 …TEST_ASSERT( mbedtls_md( mbedtls_md_info_from_type( digest ), message_str, msg_len, hash_result ) … 161 …TEST_ASSERT( mbedtls_rsa_pkcs1_sign( &ctx, &rnd_buffer_rand, &info, MBEDTLS_RSA_PRIVATE, digest, 0… 177 char *input_E, int digest, int hash, 202 if( mbedtls_md_info_from_type( digest ) != NULL ) 203 …TEST_ASSERT( mbedtls_md( mbedtls_md_info_from_type( digest ), message_str, msg_len, hash_result ) … 205 …TEST_ASSERT( mbedtls_rsa_pkcs1_verify( &ctx, NULL, NULL, MBEDTLS_RSA_PUBLIC, digest, 0, hash_resul…
|
D | test_suite_pk.function | 117 void pk_rsa_verify_test_vec( char *message_hex_string, int digest, 144 if( mbedtls_md_info_from_type( digest ) != NULL ) 145 …TEST_ASSERT( mbedtls_md( mbedtls_md_info_from_type( digest ), message_str, msg_len, hash_result ) … 147 TEST_ASSERT( mbedtls_pk_verify( &pk, digest, hash_result, 0, 156 void pk_rsa_verify_ext_test_vec( char *message_hex_string, int digest, 188 if( digest != MBEDTLS_MD_NONE ) 190 TEST_ASSERT( mbedtls_md( mbedtls_md_info_from_type( digest ), 213 digest, hash_result, hash_len,
|
D | test_suite_rsa.function | 19 void mbedtls_rsa_pkcs1_sign( char *message_hex_string, int padding_mode, int digest, 61 if( mbedtls_md_info_from_type( digest ) != NULL ) 62 …TEST_ASSERT( mbedtls_md( mbedtls_md_info_from_type( digest ), message_str, msg_len, hash_result ) … 64 …_rsa_pkcs1_sign( &ctx, &rnd_pseudo_rand, &rnd_info, MBEDTLS_RSA_PRIVATE, digest, 0, hash_result, o… 79 void mbedtls_rsa_pkcs1_verify( char *message_hex_string, int padding_mode, int digest, 103 if( mbedtls_md_info_from_type( digest ) != NULL ) 104 …TEST_ASSERT( mbedtls_md( mbedtls_md_info_from_type( digest ), message_str, msg_len, hash_result ) … 106 …TEST_ASSERT( mbedtls_rsa_pkcs1_verify( &ctx, NULL, NULL, MBEDTLS_RSA_PUBLIC, digest, 0, hash_resul…
|
D | test_suite_md.data | 57 md_text:"MD2":"message digest":"ab4f496bfb2a530b219ff33031fe06b0" 85 md_text:"MD4":"message digest":"d9130a8164549fe818874806e1c7014b" 113 md_text:"MD5":"message digest":"f96b697d7cb7938d525a2f31aaf161d0" 141 md_text:"RIPEMD160":"message digest":"5d0689ef49d2fae572b881b123a85ffa21595f36" 277 md_text_multi:"MD2":"message digest":"ab4f496bfb2a530b219ff33031fe06b0" 305 md_text_multi:"MD4":"message digest":"d9130a8164549fe818874806e1c7014b" 333 md_text_multi:"MD5":"message digest":"f96b697d7cb7938d525a2f31aaf161d0" 361 md_text_multi:"RIPEMD160":"message digest":"5d0689ef49d2fae572b881b123a85ffa21595f36"
|
/net-tools-latest/python-websocket-server/websocket_server/ |
D | websocket_server.py | 346 response_key = b64encode(hash.digest()).strip()
|
/net-tools-latest/mbedtls-2.4.0/ |
D | ChangeLog | 1645 * The generic cipher and message digest layer now have normal error 1752 + Added generic message digest and cipher wrapper
|